-
1 user-role-based security
безопасность, основанная на статусе пользователейАнгло-русский словарь по компьютерной безопасности > user-role-based security
-
2 Role-Based Interface
"A feature that customizes the contents of the user interface depending on the security permissions of the user. For example, if the user does not have permission to edit an item, the edit button will not be displayed." -
3 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
4 unit
организационная единица; боевая единица (напр. корабль, ЛА танк); подразделение; часть; соединение; расчетно-снабженческая единица; секция; орган; элемент; комплект; агрегат; установка; см. тж. elementbulk petrol (transport) unit — Бр. часть [подразделение] подвоза наливного (бестарного) горючего
counter C3 unit — часть [подразделение] подавления системы оперативного управления и связи
Fleet Marine (Corps) reconnaissance unit — разведывательное подразделение [часть] флотских сил МП
multisensor (AA) firing unit 3PK — с приборным комплексом из нескольких систем обнаружения и сопровождения
photo (graphic) reconnaissance unit — фоторазведывательная часть [подразделение]
surface-launched unit, fuel air explosive — установка дистанционного разминирования объемным взрывом
surface-launched unit, mine — установка дистанционного минирования
tactical (air) control unit — часть [подразделение] управления ТА
war (time) strength (TOE) unit — часть, укомплектованная по штатам военного времени
— air unit— ASA unit— BM unit— border operation unit— car unit— depot support unit— dry unit— EW unit— GM unit— host country unit— HQ unit— logistics support unit— manpack radio unit— marksmanship training unit— mechanized infantry unit— missile-armed unit— nuclear weapon unit— provisional unit— QM unit— Rangers unit— supported unit— TOE unit— transportation unit— truck transport unit— van unit— wet unit* * *1) часть; 2) единица
См. также в других словарях:
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia
Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… … Wikipedia
Security Identifier — In the context of the Microsoft Windows NT line of operating systems, a Security Identifier (commonly abbreviated SID) is a unique name (an alphanumeric character string) which is assigned by a Windows Domain controller during the log on process… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… … Wikipedia
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
Cisco Security Manager — is an Enterprise software management application designed to configure firewall, VPN, and Intrusion prevention system (IPS) security services on Cisco network and security devices. Cisco Security Manager can be used in networks of all sizes from… … Wikipedia
Massively multiplayer online role-playing game — Part of a series on … Wikipedia
Human-based computation — In computer science, human based computation is a technique when a computational process performs its function via outsourcing certain steps to humans (Kosorukoff, 2001). This approach leverages differences in abilities and alternative costs… … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia
Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… … Wikipedia